NETWORK RESEARCH & CYBER DEFENCE - The Cyber Academy

5
NETWORK RESEARCH & CYBER DEFENCE thecyberacademy.co.za Real Time Cyber Simulations with World Renowned Experts Online Course 02 - 09 November 2020

Transcript of NETWORK RESEARCH & CYBER DEFENCE - The Cyber Academy

Page 1: NETWORK RESEARCH & CYBER DEFENCE - The Cyber Academy

NETWORK RESEARCH

& CYBER DEFENCE

thecyberacademy.co.za

Real Time Cyber Simulations with World Renowned Experts

Online Course

02 - 09 November 2020

Page 2: NETWORK RESEARCH & CYBER DEFENCE - The Cyber Academy

DEFINITION

Companies large and small face a critical stage, cyber-attacks have transformed dramatically over the past few years. Unfortunately, organizations are still being breached too often and are under more pressure than ever to secure their systems. The Network Security course aims to address cyber challenges experienced on the network level. The course covers various attack techniques and how to defend against them.

By the end of the course, participants will have the ability to build and maintain a secure network, protect data, manage vulnerabilities, implement active access control measures, and regularly monitor the network for inconsistencies. The course sets the groundwork for later specialization in cyber forensics, advanced cyber defense and penetrating testing.

TARGET AUDIENCE

The course targets participants with basic knowledge in IT or networking, who wish to understand corporate cybersecurity and cyber defense on a technical perspective.• IT security personnel• Incident responders• Security analysts

OBJECTIVES

• Becoming familiar with the cyber threat landscapes• Acquiring the knowledge and tools to recognize threats in the network.• Testing networks and network-based-systems for vulnerabilities.• Understanding cyber-attacks.• Becoming familiar with a variety of available tools for performing security-related tasks.

REGISTER NOW

R11,999 +Vat

ABOUT THE TRAINER

ABOUT THE SIMULATOR

An accredited expert in information security and cyber operations with over then 15 years ofexperience. Senior trainer to special forces and secret service worldwide. Leading a talented team ofsecurity professionals across research, training, and development of new tools and capabilities.David’s experience includes years of exploring and instructing on cyber security topics, engaging with military, government and enterprise customers worldwide.

The CYBERIUM ARENA is our advanced simulation platform that provides realistic training scenarios to improve the performance of your organization’s security team. By doing hands-on exercises in the CYBERIUM ARENA environment right at the workshop, the participants will practice real security scenarios and learn to manipulate and deal with them, carry out complex computer attacks, analyze in depth sophisticated cyber events, understand how they occurred and learn to work according to the best and most effective methodologies in the cyber security world. Using this environment will enable students to gain practical experience during their studies. Among the scenarios you can practice and investigate: malware intrusion and detection, DDoS attacks and breaches and more. ThinkCyber develops real-world scenarios for companies and armies in the Israeli and international markets that help to prepare and protect against potential threats.Prominent Advantages:• Upgrading response capabilities to cyber-attack event• Controlling methods to deal with threats

Page 3: NETWORK RESEARCH & CYBER DEFENCE - The Cyber Academy

Module 1: Introduction to Linux

During this module, students will study the fundamentals of the Linux OS – How to use basic commands, manipulation of text and command outputs, understanding the Terminal-Emulator, permissions, and other security concepts.

Module 2: Networking

During this module, participants will study the basics of network infrastructures, common network types, network Layers, and communications between protocols, communication between network devices from different Layers, and network anonymity methods.

• Virtualization - Introduction to Virtualization - About Linux Distro - Installing Linux - Working with VMWare - Bridged vs. NAT • Working with Linux - Linux Directories - Linux Users - Packages o Packages Commands o Updating o Installing and Managing - File Manipulation Commands - Text and File Manipulation Technics - Writing Linux Scripts o Permissions o Variables o Conditions o Loops o Automation

• Protocols and Services - TCP/IP and OSI Model o Network Routing Basics - DNS - DHCP - ARP - Remote connection Protocols - Important Protocols• Wireshark – Diving into Packets - Non-Secure and Secure Packets - Filtering and parsing - Extracting Objects and Files from PCAP Files

REGISTER NOW

Page 4: NETWORK RESEARCH & CYBER DEFENCE - The Cyber Academy

Module 3: Introduction to Network Forensics

Large organizations these days suffer greatly from network attacks and malicious intrusions. Those who manage the organization’s network have an immense impact on ensuring its safety. This module will introduce participants to Network Forensics and will learn the ability to locate and better understand various attacks.

• Windows Tools - Advanced Wireshark o OS-Fingerprinting o Detecting Suspicious Traffic o GeoIP Mapping - NetworkMiner - Sysinternals o Procmon o TCPview• Linux Tools - TShark - Network Analyzing Automation o Capture Packet Data from Live Network o Filter Packets from Live Network o Filter Packet from PCAP File o Traffic Statistics o Automating Network Capture and Filtering o File-Carving - Zeek Tools: Bro and Bro-Cut o Extracting Information o Parsing Traffic Logs - CAPInfo

Module 4: Cyber Security

The primary goal of this module is teaching participants to embrace the attacker state-of-mind to recognize the necessary defense mechanisms. Participants will deal with several types of attacks. Students will learn about hash functions; furthermore, they will learn how wireless networks are attacked and how the organization as vulnerable to those attacks. Social engineering and honeypot techniques will also be demonstrated.

• Cyber Security Vectors - Anti-Viruses - Firewalls and FWNG - DoS and DDoS - CNC Servers and Botnets - Wireless Attack Concepts o Handshake Based Authorization o Deauthentication Attacks MiTM o Evil-Twin - Steganography• Network Attacks - Introduction to Scanning - Scanning Methods in Nmap - Scanning with Shodan - MiTM - ARP poisoning o DNS Spoofing - DHCP Starvation - LLMNR Attacks o Offline Password Brute-Force o Working with Responder• Cyber Attack Practice - Backdooring o Payloads: Reverse vs. Bind o Multi-Handler - Privilege Escalation

REGISTER NOW

Monitoring Display

The Monitoring Display is a tablet-based screen that allows the trainer to view each student’s screen, statistics, and scores. This information allows the trainer to note the strengths and weaknesses of every student.

The Operator Display is a live-score screen where the trainer is able to see each students’ progress during each scenario and compare the standing of different students as they work through the tasks.

Operator Display

Page 5: NETWORK RESEARCH & CYBER DEFENCE - The Cyber Academy

Test your Skills in our World Renowned Cyberium Simulator

The course will include:1 Project and 16 labs all under the supervision of global cyber experts.

FIVE EIGHTEEN 90% 40SCENARIOS LABS HANDS-ON DURATION

LAB 1 LAB 2 LAB 3 LAB 4

LAB 8LAB 7LAB 6LAB 5

LAB 9 LAB 10 LAB 11 LAB 12

LAB 13 LAB 14 LAB 15 LAB 16

LAB 17 LAB 18

Linux and BasicCommands

Text Manipulation Using the Internet Linux Services

Scanning with Nmap Scanning with Shodan Linux Bash Scripts Offline Brute-Force

Online Brute-Force Netcat Using Wireshark Using Tshark

Trojans Network Attacks

Anonymous Exploits File Structure Steganography

Scenario: NR001

During the World Cup in Romania, fans dream about finding affordable tickets. This summer, according to the Federal Trade Commission, scammers are duping fans with phishing emails that include enticing, but fake, free trips to Romania. The research discovered a large number of phishing emails, and they equire your assistance to investigate them.

Scenario: NR002

A network administrator of a big company suspects that an employee was tricked by a scam email, in which he accidentally downloaded a Trojan malware.

Scenario: NR003

An advanced group of hackers has been recently spotted to be sending a vast amount of phishing mail addresses, successfully hacking a large number of top executives. One of the hacked companiessuspects that even after mitigating the issue, a backdoor is present and alive at the system.

Scenario: NR004

German police are seeking your help in gathering information related to the IP address that could lead to the cell phone device used by a DHL blackmailer whom last year parceled out bombs at differentaddresses in Brandenburg and Berlin.

Scenario: NR005

Recently a large credit card company had a large data breach. The credit card database was hacked, stolen, and leaked to the DarkNet. Now, the company requested your firm’s assistance on finding theattackers and mitigating the leak, use your forensics knowledge to solve the data leak.

REGISTER NOW